If you are wondering what happened since last post well, we’d need a full book to describe.
Nothing bad, all awesome things. Things got hectic and projects and opportunities for us endless.
This won’t forgive us for not being present on the blog but you know this is start-up life in a tough world like Information Security.
We have got new 9 minutes of pwnage for you to enjoy in our Youtube channel
Hello everyone, new week, new video.
Here you can see the difference between using staged and non staged shellcodes from a functional point of view and under the perspective of a pentester who wants to evade AV’s. Then we dive into msfencode and its usage to bypass AV’s.